Climb appointed Sophos distribution partner for the Irish market

Climb Channel Solutions, (“Climb” or the “Company”), an international specialty technology distributor and wholly owned subsidiary of Climb Global Solutions, Inc. , today announces a distribution party tnership with cybersecurity vendor, Sophos for the Irish market.

Unique to this partnership, Climb will be the only authorised Irish distributor to offer the Sophos Threat Profile assessment service to customers. This service highlights exposed credentials, suspicious domains, dark web exposure, and internet-facing vulnerabilities, and enables businesses to prioritise remediation and reduce risk.

Ireland’s cybersecurity sector is buoyant and growing 13.4% and generating revenue of €2.7bn according to a 2025 report by Cyber Ireland and NI Cyber. Climb will facilitate direct access to Sophos Central, one of the world’s leading cybersecurity platforms, an adaptive AI-native platform that intercepts attacks before they occur.

Climb will distribute the entire Sophos suite of products including the managed detection and response (MDR) service that eliminates threats at speed, alongside defence across endpoint, firewall, email and cloud.

These solutions will be backed by Climb’s reputation for speed, emerging tech expertise, and strong partner investment, working with the Sophos reseller and managed service provider (MSP) landscape.

Recent Climb research* highlights growing AI maturity across organisations, creating increased demand for AI-enabled cybersecurity services. For example, more than half (53%) of organisations have a clear AI strategy, and 55% are working with technology vendors on their AI journey. Against this backdrop, Climb expects Irish businesses to continue to adapt and embed AI security solutions across their cloud and network environments.

Commenting on the distribution partner announcement, Brian Davis, VP of Sales UK&I, Climb states: “Ireland’s cybersecurity landscape is evolving at pace with recent research showing growth of 13% per annum. Threats are becoming more sophisticated, and customer expectations are rising. Cybersecurity remains a key strategic growth area for Climb, and we are continuously looking to expand our portfolio in Ireland.  Extending our successful relationship with Sophos into Ireland is a pivotal moment as we enhance our cybersecurity portfolio.

“As Irish organisations advance their AI capabilities at an unprecedented rate, Irish businesses must secure hybrid environments while embracing AI and digital transformation. As a dedicated Sophos distributor in Ireland, we’re bringing world-class cybersecurity, genuine partner support, and the kind of speed and access that helps you move fast and grow confidently.”

Jason Ellis, VP Channel Sales EMEA, Sophos comments: “Sophos is a global leader in cybersecurity, offering a comprehensive portfolio of AI-powered cybersecurity technologies. Coupled with its advisory services, these capabilities proactively reduce risk for organisations. Expanding our presence in the Irish market is a reflection of the great relationship we hold with Climb in North America. Climb’s strong Irish channel ecosystem will allow us to expand our Irish market footprint, enhancing our ability to deliver AI-powered cybersecurity solutions to Irish businesses.

“We recognise Climb as an innovative leader, particularly in areas such as AI, where they’re providing unique channel solutions through their Skyward Project and AI Academy***. These programmes help partners understand where AI and security intersect, delivering differentiated, yet complementary services to our Sophos portfolio.

“Climb’s knowledge and understanding of the Irish market, along with their ongoing investment, help us better support our partners and customers, enabling them to improve cyber resilience and respond effectively to emerging threats.”

This partnership enhances Climb’s AI cybersecurity offering in Ireland, building on its long-standing cybersecurity pedigree. Climb has a long track record as a distributor of cybersecurity solutions, working with some of the world’s leading security vendors and an extensive network of Irish resellers.

Climb solutions include cloud security, backup and recovery, endpoint management, firewall and network security, and application security. Through this Sophos partnership, Climb enhances their cybersecurity offering enabling partners to accelerate growth by combining strong cybersecurity expertise, with a more personalised service approach alongside innovative programmes and events, including the upcoming AI and Security Day.

Irish business working remotely due to coronavirus? Here’s how to do it securely…#Cybersecurity #Sophos #Coronavirus

Many, if not most, organisations have already crossed the “working from home”, or at least the “working while on the road” bridge.

If you’re on the IT team, you’re probably used to preparing laptops for staff to use remotely, and setting up mobile phones with access to company data.

But global concerns over the current coronavirus (Covid-19) outbreak, and the need to keep at-risk staff away from the office, means that lots of companies may soon and suddenly end up with lots more staff working from home…

…and it’s vital not to let the precautions intended to protect the physical health of your staff turn into a threat to their cybersecurity health at the same time.

Importantly, if you have a colleague who needs to work from home specifically to stay away from the office then you can no longer use the tried-and-tested approach of getting them to come in once to collect their new laptop and phone, and to receive the on-site training that you hope will make them a safer teleworker.

You may end up needing to set remote users up from scratch, entirely remotely, and that might be something you’ve not done a lot of in the past.

So here are our five tips for working from home safely.

  1. Make sure it’s easy for your users to get started

Look for security products that offer what’s called an SSP, short for Self-Service Portal.

What you are looking for is a service to which a remote user can connect, perhaps with a brand-new laptop they ordered themselves, and set it up safely and easily without needing to hand it over to the IT department first.

Many SSPs also allow the user to choose between different levels of access, so they can safely connect up either a personal device (albeit with less access to fewer company systems than they’d get with a dedicated device), or a device that will be used only for company work.

The three key things you want to be able to set up easily and correctly are: encryption, protection and patching.

Encryption means making sure that full-device encryption is turned on and activated, which protects any data on the device if it gets stolen; protection means that you start off with known security software, such as anti-virus, configured in the way you want; and patching means making sure that the user gets as many security updates as possible automatically, so they don’t get forgotten.

Remember that if you do suffer a data breach, such as a lost laptop, you may well need to disclose the fact to the data protection regulator.

If you want to be able to claim that you took the right precautions, and thus that the breach can be disregarded, you’ll need to produce evidence – the regulator won’t just take your word for it!

  1. Make sure your users can do what they need

If users genuinely can’t do their job without access to server X or to system Y, then there’s no point in sending them off to work from home without access to X and Y.

Make sure you have got your chosen remote access solution working reliably first – force it on yourself! – before expecting your users to adopt it.

If there are any differences between what they might be used to and what they are going to get, explain the difference clearly – for example, if the emails they receive on their phone will be stripped of attachments, don’t leave them to find that out on their own.

They’ll not only be annoyed but will probably also try to make up their own tricks for bypassing the problem, such as asking colleagues to upload the files to private accounts instead.

If you’re the user, try to be understanding if there are things you used to be able do in the office that you have to manage without at home.

  1. Make sure you can see what your users are doing

Don’t just leave your users to their own devices (literally or figuratively).

If you’ve set up automatic updating for them, make sure you also have a way to check that it’s working, and be prepared to spend time online helping them fix things if they go wrong.

If their security software produces warnings that you know they will have seen, make sure you review those warnings too, and let your users know what they mean and what you expect them to do about any issues that may arise.

Don’t patronise your users, because no one likes that; but don’t leave them to fend for themselves, either – show them a bit of cybersecurity love and you are very likely to find that they repay it.

  1. Make sure they have somewhere to report security issues

If you haven’t already, set up an easily remembered email address, such as security911 @ yourcompany DOT example, where users can report security issues quickly and easily.

Remember that a lot of cyberattacks succeed because the crooks try over and over again until one user makes an innocent mistake – so if the first person to see a new threat has somewhere to report it where they know they won’t be judged or criticised (or, worse still, ignored), they’ll end up helping everyone else.

Teach your users – in fact, this goes for office-based staff as well as teleworkers – only to reach out to you for cybersecurity assistance by using the email address or phone number you gave them. (Consider snail-mailing them a card or a sticker with the details printed on it.)

If they never make contact using links or phone numbers supplied by email, they they are very much less likely to get scammed or phished.

  1. Make sure you know about “shadow IT” solutions

Shadow IT is where non-IT staff find their own ways of solving technical problems, for convenience or speed.

If you have a bunch of colleagues who are used to working together in the office, but who end up flung apart and unable to meet up, it’s quite likely that they might come up with their own ways of collaborating online – using tools they’ve never tried before.

Sometimes, you might even be happy for them to do this, if it’s a cheap and happy way of boosting team dynamics.

For example, they might open an account with an online whiteboarding service – perhaps even one you trust perfectly well – on their own credit card and plan to claim it back later.

The first risk everyone thinks about in cases like this is, “What if they make a security blunder or leak data they shouldn’t?”

But there’s another problem that lots of companies forget about, namely: what if, instead of being a security disaster, it’s a conspicuous success?

A temporary solution put in place to deal with a public health issue might turn into a vibrant and important part of the company’s online presence.

So, make sure you know whose credit card it’s charged to, and make sure you can get access to the account if the person who originally created it forgets the password, or cancels their card.

So-called “shadow IT” isn’t just a risk if it goes wrong – it can turn into a complicated liability if it goes right!

Most of all…

Most of all, if you and your users suddenly need to get into teleworking, be prepared to meet each other halfway.

For example, if you’re the user, and your IT team suddenly insists that you start using a password manager and 2FA (those second-factor login codes you have to type in every time)…

…then just say “Sure,” even if you hate 2FA and have avoided it in your personal life because you find it inconvenient.

And if you’re the sysadmin, don’t ignore your users, even if they ask questions you think they should know the answer to by now, or if they ask for something you’ve already said “No” to…

…because it might very well be that they’re asking because you didn’t explain clearly the first time, or because the feature they need really is important to doing their job properly.

We’re living in tricky times, so try not to let matters of public health cause the sort of friction that gets in the way of doing cybersecurity properly!